By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

stories of last year, as government officials, industry professionals and consumers battled over where to draw the line between security and privacy. The issue has had a major effect across IT, as businesses were forced to re-examine information management processes in an effort to protect confidential customer information while still achieving maximum business benefit.

Across SearchCompliance's sister sites, we've found some great articles explaining how the spotlight on NSA data collection is influencing corporate privacy, security and overall information management. In these pieces, learn how the NSA controversy has shed new light on personal online information protection and how it's influencing corporate privacy and security policies.

Can CIOs learn and benefit from NSA data collection efforts?For today's information-centric society, the push-pull between systems' data management capabilities and individual rights is complex. It's easier than ever before to collect, keep and search digitized data -- including Web log traffic and geolocation info. The NSA surveillance activities are a prime example, as the agency asserts that it uses metadata to reveal nefarious behaviors and protect national security. But can businesses benefit from these metadata tracking techniques? In this SearchCIO Data Mill column, Nicole Laskowski discusses the benefits and drawbacks as businesses incorporate traits inherent to the NSA's data collection efforts.

The NSA data monitoring controversy influencing enterprise security strategyNSA data collection processes have raised privacy concerns among private U.S. citizens, but enterprises have been embroiled in the online monitoring debate as well. Under NSA processes and U.S. surveillance laws, federal authorities can demand customer information from private sector companies. In this SearchSecurity video interview recorded in Boston at Information Security Decisions 2013, Rich Mogull, CEO and analyst for Phoenix-based consultancy Securosis, discusses why enterprises need to be aware of the data they collect from users and why they must remain vigilant as the NSA controversy potentially weakens security products and standards.

Information ethics issues arise as organizations try to balance access, privacyIn the big data era, companies are struggling to achieve information privacy and efficient data access. Data snooping by the NSA and high-profile retail store breaches have only made this struggle more complicated and created more corporate "data ethics" concerns. In this column from SearchDataManagement editor Jack Vaughan, learn why data professionals must find the right balance between accessing data, protecting individuals' privacy and using information to make money.

More on data collection and privacy

Data collection policy considered following NSA surveillance revelationsAs NSA data collection activities grabbed headlines last summer, the White House went into damage-control mode: President Barack Obama announced the development of a working group tasked with reviewing how data collection and analysis affect people's privacy and discussed potential reforms to NSA surveillance activities. But would these changes to U.S. data collection policies impede business innovation? Find out in this SearchCIO Searchlight column.

NSA controversy exemplifies global Web privacy issuesThe NSA's surveillance activities were only the tip of the iceberg when it came to all the controversial data privacy news that came to light in the past several months. The debate over whether data security takes precedence over privacy (and vice versa) should give CIOs pause, according to SearchCIO writer Karen Goulart. Learn why in this column, as Goulart explains the tightrope CIOs must walk between online security and employee privacy.

0 comments

E-Mail

Username / Password

Password

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy